安全公告详情

NS-SA-2020-0035

2020-07-17 20:50:57

简介

important: python-pip/libreswan security update

严重级别

important

主题

An update for python-pip/libreswan is now available for NewStart CGSL MAIN 6.01.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

python-pip: pip is a package management system used to install and manage software packages written in Python. Many packages can be found in the Python Package Index (PyPI). pip is a recursive acronym that can stand for either "Pip Installs Packages" or "Pip Installs Python".
libreswan: Libreswan is a free implementation of IKE/IPsec for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks. Everything passing through the untrusted net is encrypted by the ipsec gateway machine and decrypted by the gateway at the other end of the tunnel. The resulting tunnel is a virtual private network or VPN. This package contains the daemons and userland tools for setting up Libreswan. Libreswan also supports IKEv2 (RFC7296) and Secure Labeling Libreswan is based on Openswan-2.6.38 which in turn is based on FreeS/WAN-2.04


Security Fix(es):
python-pip: The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is related to use of the ssl_context, ca_certs, or ca_certs_dir argument.(CVE-2019-11324)
python-pip: In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter.(CVE-2019-11236)
python-pip: urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext.(CVE-2018-20060)
python-pip: A credentials-exposure flaw was found in python-requests, where if a request with authentication is redirected (302) from an HTTPS endpoint to an HTTP endpoint on the same host, the Authorization header is not stripped and the credentials can be read in plain text. A man-in-the-middle attacker could exploit this flaw to obtain a user's valid credentials.(CVE-2018-18074)
python-pip: bugfix
libreswan: An out-of-bounds buffer read flaw was found in the pluto daemon of libreswan. An unauthenticated attacker could use this flaw to crash libreswan by sending specially-crafted IKEv1 Informational Exchange packets. The daemon respawns after the crash.(CVE-2020-1763)
libreswan: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.01.20B5.

影响组件

  • python-pip
  • libreswan

影响产品

  • CGSL MAIN 6.01

更新包

{"fix":[{"product":"CGSL MAIN 6.01","pkgs":[{"binary":["platform-python-pip-9.0.3-16.el8.noarch.rpm","python-pip-doc-9.0.3-16.el8.noarch.rpm","python3-pip-wheel-9.0.3-16.el8.noarch.rpm","python3-pip-9.0.3-16.el8.noarch.rpm"],"source":"python-pip-9.0.3-16.el8.src.rpm"},{"binary":["libreswan-3.29-7.el8_2.x86_64.rpm","libreswan-debuginfo-3.29-7.el8_2.x86_64.rpm","libreswan-debugsource-3.29-7.el8_2.x86_64.rpm"],"source":"libreswan-3.29-7.el8_2.src.rpm"}]}]}

CVE

参考